Monthly archives: June, 2018

Chuck Leaver – What You Need To Know About Patch Validation

Written By Logan Gilbert And Presented By Chuck Leaver   Introduction A current report suggests almost 20,000 brand-new software application vulnerabilities were found in 2017 – an all time record. Think of that for a second. That’s an average of fifty five new vulnerabilities each day. That’s a large amount for any IT store to



Chuck Leaver – Making Sense Of GDPR And Monitoring Cybersecurity

Written By Dr Al Hartmann And Presented By Chuck Leaver   Robust enterprise cybersecurity naturally includes monitoring of network, endpoint, application, database, and user activity to prevent, identify, and react to cyber risks that might breach personal privacy of business staff, partners, suppliers, or clients. In cyber space, any blind spots become free fire zones